Home Internet SecurityDecember 24, 2021 Use of Log4j vulnerabilities in ransomware activity The ACSC expects an increase in ransomware activity using Log4j as an exploit vector. Malicious actors may take advantage of trivial exploits to impact Australian organisations. TAGS: Aus Government Cyber Alerts Related posts Multiple vulnerabilities present in VMware…Multiple vulnerabilities present in F5…Multiple vulnerabilities present in the…Remote code execution vulnerability present…New domain name changes could leave your…Australian organisations encouraged to urgently…Australian organisations encouraged to urgently…Critical vulnerability identified in Apple…Critical vulnerability present in SAP…Increased Global Ransomware Threats