In this post, we analyze a new opportunistic exploitation campaign based on the Log4j vulnerability.
In this post, we analyze a cluster of malicious PyPI packages targeting specific MacOS machines.