The Log4j vulnerability is being targeted in new malicious campaigns dubbed “proxyjacking” where adversaries attempt to install the legitimate network segmentation tool called proxyware on unsuspecting victims in order to resell a target’s bandwidth for up to $10 a month.Sysdig’s Threat…
Source: www.scmagazine.com – Read more

Bookworm to Stately Taurus Using the Unit 42 Attribution Framework – Palo Alto Networks
Bookworm to Stately Taurus Using the Unit 42 Attribution Framework Palo Alto Networks