#RSAC: Log4J Still Among Top Exploited Vulnerabilities, Cato Finds

A new report by Cato Networks found that exploiting old vulnerabilities in unpatched systems is one of threat actors’ favorite initial access vectors

This article has been indexed from www.infosecurity-magazine.com

Read the original article: