Example of how attackers are trying to push crypto miners via Log4Shell – SANS Internet Storm Centre
Another Bluetooth security – this time in a child’s toy
Fisher Price Chatter Special Edition Rather than children using their imagination to make a call with these toys – an adult, with little care for security added Bluetooth for that real call experience on the playschool toy. Bluetooth reboot of pre-school play phone has privacy flaw • The Register
Log4j in China
Chinese regulator pauses partnership with Alibaba – BBC News Alibaba Cloud in trouble with Beijing for Log4J annoucement • The Register I found this video on YouTube that has a good in-depth description of the Log4j problem. It will keep you up speed with all the acronyms, shells, code etc.
Belgian defence ministry systems exploited via Log4j flaw
Belgian defence ministry admits attackers accessed its computer network by exploiting Log4j vulnerability • The Register As if you needed reminding that if the Log4j vulnerability impacts you, you need to take action.
Just like buses – Log4j flaws come in threes
Bad things come in threes: Apache reveals another Log4J bug • The Register A third bug has been found in the Log4j system. There has been three new versions of the software since the crisis started.