[Blog] Automatically detecting log4j vulnerabilities in your IT