Not the Yule log we were expecting
…hon! Sources [1] https://www.theguardian.com/commentisfree/2021/dec/18/how-cut-and-pasted-programming-is-putting-the-internet-and-society-at-risk [2] https://www.bleepingcomputer.com/news/security/log4j-vulnerability-now-used-by-state-backed-hackers-access-brokers/ [3] https://appleinsider.com/articles/21/12/13/critical-log4j-java-flaw-being-used-to-deliver-malware-crypto-miners [4] https://www.ncsc.gov.uk/blog-post/log4j-vulnerability-what-should-boards-be-asking [5] https://github.com/curated-intel/Log4Shell-IOCs [6] https://github.com/snyk-labs/awesome-log4shell [7] https://www.cisecurity.org/log4j-zero-day-vulnerability-response/ [8] https://www.ncsc.gov.uk/section/active-cyber-defence/introduction [9] https://www.ncsc.gov.uk/section/keep-up-to-date/cisp [10] https://socitm.net/about/warps/ [11] https://guidance.ctag.org.uk [12] https://www.reuters.com/technology/major-tech-companies-struggle-plug-holes-logging-software-2021-12-16/ [13] https://www.zdnet.com/article/apache-releases-new-2-17-0-patch-for-log4j-to-solve-denial-of-service-vulnerability/ [14] https://www.govcert.ch/blog/zero-day-exploit-targeting-popular-java-library-log4j/…