This past December, one of the worst software vulnerabilities in history emerged. With the Log4j CVE-2021-44228 vulnerability (a.k.a. Log4Shell), threat actors won the triple crown of exploits.
The scope was massive, affecting millions of consumer products, enterprise software and web applications. The threat was profound, giving malicious parties veritable free reign over compromised devices. And, to make matters worse, the exploit was painfully simple to execute, requiring just a single line of code.