-Informational Posts: https://www.darkreading.com/dr-tech/what-to-do-while-waiting-for-the-log4ju-updates https://www.securityweek.com/companies-respond-log4shell-vulnerability-attacks-rise https://www.itworldcanada.com/article/it-could-take-years-for-applications-using-vulnerable-version-of-java-log4j-library-to-be-patched-says-expert/468238 https://www.helpnetsecurity.com/2021/12/13/log4shell-update-cve-2021-44228/ https://research.nccgroup.com/2021/12/12/log4j-jndi-be-gone-a-simple-mitigation-for-cve-2021-44228/ https://www.splunk.com/en_us/blog/security/log4shell-detecting-log4j-vulnerability-cve-2021-44228-continued.html -Blue team resources https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592 https://github.com/cisagov/log4j-affected-db https://www.greynoise.io/blog/apache-log4j-vulnerability-CVE-2021-44228 -IP Tracking projects https://gist.github.com/gnremy/c546c7911d5f876f263309d7161a7217 https://www.greynoise.io/viz/query/?gnql=tag