BleepingComputer's most popular cybersecurity and tech stories of 2021

As many other applications use Log4j, threat actors quickly used the "Log4Shell" vulnerability in cyberattacks to deploy ransomware, install the ...