In this post, we analyze a new opportunistic exploitation campaign based on the Log4j vulnerability.| securitylabs.datadoghq.com