Understanding and Responding to the Apache Log4j Vulnerability